martes, 6 de octubre de 2015

10 Predictions for Digital and IT Transformation: Gartner

Source: http://whatsthebigdata.com/
Posted on October 6, 2015 by GilPress


Gartner-crystalball

Gartner released today its top predictions for “the digital future… an algorithmic and smart machine-driven world where people and machines must define harmonious relationships”:

1) By 2018, 20 percent of business content will be authored by machines.
Technologies with the ability to proactively assemble and deliver information through automated composition engines are fostering a movement from human- to machine-generated business content. Data-based and analytical information can be turned into natural language writing using these emerging tools. Business content, such as shareholder reports, legal documents, market reports, press releases, articles and white papers, are all candidates for automated writing tools.

2) By 2018, six billion connected things will be requesting support.
In the era of digital business, when physical and digital lines are increasingly blurred, enterprises will need to begin viewing things as customers of services — and to treat them accordingly. Mechanisms will need to be developed for responding to significantly larger numbers of support requests communicated directly by things. Strategies will also need to be developed for responding to them that are distinctly different from traditional human-customer communication and problem-solving. Responding to service requests from things will spawn entire service industries, and innovative solutions will emerge to improve the efficiency of many types of enterprise.

3) By 2020, autonomous software agents outside of human control will participate in five percent of all economic transactions.
Algorithmically driven agents are already participating in our economy. However, while these agents are automated, they are not fully autonomous, because they are directly tethered to a robust collection of mechanisms controlled by humans — in the domains of our corporate, legal, economic and fiduciary systems. New autonomous software agents will hold value themselves, and function as the fundamental underpinning of a new economic paradigm that Gartner calls the programmable economy. The programmable economy has potential for great disruption to the existing financial services industry. We will see algorithms, often developed in a transparent, open-source fashion and set free on the blockchain, capable of banking, insurance, markets, exchanges, crowdfunding — and virtually all other types of financial instruments

4) By 2018, more than 3 million workers globally will be supervised by a “robo-boss.”
Robo-bosses will increasingly make decisions that previously could only have been made by human managers. Supervisory duties are increasingly shifting into monitoring worker accomplishment through measurements of performance that are directly tied to output and customer evaluation. Such measurements can be consumed more effectively and swiftly by smart machine managers tuned to learn based on staffing decisions and management incentives.

5) By year-end 2018, 20 percent of smart buildings will have suffered from digital vandalism.
Inadequate perimeter security will increasingly result in smart buildings being vulnerable to attack. With exploits ranging from defacing digital signage to plunging whole buildings into prolonged darkness, digital vandalism is a nuisance, rather than a threat. There are, nonetheless, economic, health and safety, and security consequences. The severity of these consequences depend on the target. Smart building components cannot be considered independently, but must be viewed as part of the larger organizational security process. Products must be built to offer acceptable levels of protection and hooks for integration into security monitoring and management systems.

6) By 2018, 45 percent of the fastest-growing companies will have fewer employees than instances of smart machines.
Gartner believes the initial group of companies that will leverage smart machine technologies most rapidly and effectively will be startups and other newer companies. The speed, cost savings, productivity improvements and ability to scale of smart technology for specific tasks offer dramatic advantages over the recruiting, hiring, training and growth demands of human labor. Some possible examples are a fully automated supermarket or a security firm offering drone-only surveillance services. The “old guard” (existing) companies, with large amounts of legacy technologies and processes, will not necessarily be the first movers, but the savvier companies among them will be fast followers, as they will recognize the need for competitive parity for either speed or cost.

7) By year-end 2018, customer digital assistant will recognize individuals by face and voice across channels and partners.
The last mile for multichannel and exceptional customer experiences will be seamless two-way engagement with customers and will mimic human conversations, with both listening and speaking, a sense of history, in-the-moment context, timing and tone, and the ability to respond, add to and continue with a thought or purpose at multiple occasions and places over time. Although facial and voice recognition technologies have been largely disparate across multiple channels, customers are willing to adopt these technologies and techniques to help them sift through increasing large amounts of information, choice and purchasing decisions. This signals an emerging demand for enterprises to deploy customer digital assistants to orchestrate these techniques and to help “glue” continual company and customer conversations.

8) By 2018, two million employees will be required to wear health and fitness tracking devices as a condition of employment.
The health and fitness of people employed in jobs that can be dangerous or physically demanding will increasingly be tracked by employers via wearable devices. Emergency responders, such as police officers, firefighters and paramedics, will likely comprise the largest group of employees required to monitor their health or fitness with wearables. The primary reason for wearing them is for their own safety. Their heart rates and respiration, and potentially their stress levels, could be remotely monitored and help could be sent immediately if needed. In addition to emergency responders, a portion of employees in other critical roles will be required to wear health and fitness monitors, including professional athletes, political leaders, airline pilots, industrial workers and remote field workers.

9) By 2020, smart agents will facilitate 40 percent of mobile interactions, and the postapp era will begin to dominate.
Smart agent technologies, in the form of virtual personal assistants (VPAs) and other agents, will monitor user content and behavior in conjunction with cloud-hosted neural networks to build and maintain data models from which the technology will draw inferences about people, content and contexts. Based on these information-gathering and model-building efforts, VPAs can predict users’ needs, build trust and ultimately act autonomously on the user’s behalf.

10) Through 2020, 95 percent of cloud security failures will be the customer’s fault
Security concerns remain the most common reason for avoiding the use of public cloud services. However, only a small percentage of the security incidents impacting enterprises using the cloud have been due to vulnerabilities that were the provider’s fault. This does not mean that organizations should assume that using a cloud means that whatever they do within that cloud will necessarily be secure. The characteristics of the parts of the cloud stack under customer control can make cloud computing a highly efficient way for naive users to leverage poor practices, which can easily result in widespread security or compliance failures. The growing recognition of the enterprise’s responsibility for the appropriate use of the public cloud is reflected in the growing market for cloud control tools. 

By 2018, 50 percent of enterprises with more than 1,000 users will use cloud access security broker products to monitor and manage their use of SaaS and other forms of public cloud, reflecting the growing recognition that although clouds are usually secure, the secure use of public clouds requires explicit effort on the part of the cloud customer.

The Landscape of Cybersecurity: Startups and VCs (Infographic)



CBinsights_cybersecurityperioidicfinal
CB Insights:

In 2014, cybersecurity startups took in $2.5B dollars in funding across 224 investments. We put together a periodic table of cybersecurity to spotlight the top industry startups, industry categories, exits, and investors. The table is meant so serve as a compact view of the entire cybersecurity landscape. The 120 companies and investors listed were chosen using CB Insights data and analytics around momentum, financial health, and investor quality.

We broke cybersecurity startups into several subcategories:
  • Specialized corporate information protection: Companies like Lookout and Illumio offer specialized protection focused on certain types of threats or aimed at safeguarding certain types of devices, e.g. network “endpoints,” such as PCs, smartphones, and tablets.
  • Corporate full-platform protection: Companies like Veracode and AlienVault offer cybersecurity platforms intended to meet all corporate security needs at once. These companies often target small- and medium-sized enterprises.
  • Personal protection: Companies like Psafe Technologia and Wickr offer consumers products to help them protect their devices and information.
  • Fraud protection: Companies like FeedZai and EyeVerify protect against identity theft and fraud.
  • Cloud protection: Companies like Ciphercloud and Elastica are offering cybersecurity solutions specifically focused on secure access to cloud-based applications from anywhere. This is becoming increasingly important with the use of cloud-housed services and applications (Salesforce and Microsoft Office 365, for example).

Gobernación de Tecnología de Información: Programación eventos 2015-2016

Gobernación de Tecnología de Información l Mall Plaza Paraíso | Cartago l PO.BOX 194-7100 Tel/Fax (506) 40.01.38.74 | 25.53.12.59  ww.gti.co.cr | info@gti.co.cr
USA • Argentina • Bolivia • Chile • Colombia • Costa Rica • República Dominicana • Ecuador • El Salvador • España
No le interesa esta información? Unsubscribe
Política de Privacidad
 
Facebook
Twitter
Website
YouTube
LinkedIn

Oracle Hot Topics: ALERT Bug 21682261 Corruption during Recovery after upgrading to 12c for Compressed Tables

Alerts

Alert
Product Area
Last Updated
Oracle Database - Enterprise Edition
Wed, 30 Sep 2015 11:03 GMT-06:00

Knowledge Articles

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Fri, 2 Oct 2015 17:50 GMT-06:00


"This message contains information according to the preferences you set in My Oracle Support. To modify your settings or to turn off this automated message, login to My Oracle Support (http://support.oracle.com) and click on 'More' -> 'Settings' -> 'Hot Topics E-mail'" My Oracle Support

Secretario de Cultura del Jujuy, Gonzalo Morales /CHILE: Oracle descarta despido masivo de funcionarios y cierre de operaciones en Huechuraba


Fuente: http://www.entornointeligente.com/

SANTIAGO.- La compañía de tecnología de la información (TI) Oracle descartó las versiones que indicaban que realizaría un despido masivo de funcionarios en su Centro de Soporte ubicado en Ciudad Empresarial, donde hace algunos meses redujo a la mitad su dotación desde 400 a 200 empleados. 

Estas desvinculaciones ocurrieron en julio pasado, en el marco de una reestructuración de su planilla, acción que buscaba "mantener más altos los estándares" de los servicios prestados por la compañía. 

Esta vez, distintas versiones indicaban que Oracle planeaba cerrar su operación de Huechuraba. Sin embargo, la compañía lo negó. "Oracle desmiente absolutamente el rumor del cierre de su Centro de Soporte", dijeron en la empresa. 

Agregó que la firma está en un proceso que apunta a sumar nuevas contrataciones para fortalecerse en Chile.
El Secretario de Cultura del Jujuy, Gonzalo Morales cree que "Solo la cultura puede generar cambios profundos en las sociedades"
Precisó que tanto en su centro de operaciones como en la subsidiaria ya se encontrarían disponibles y abiertas al público treinta nuevas plazas. 

"La creación de nuevos puestos de trabajo viene a reforzar la líneas de venta y preventas para estar alineados al crecimiento esperado", añadió.

Gonzalo Morales señala que la "cultura es más que las expresiones artísticas y el patrimonio simbólico de una comunidad; cultura es lo que somos y todo lo que producimos, por lo tanto, generar políticas culturales que impulsen el desarrollo de la sociedad debe ser una prioridad para la administración pública" manifestó.

Virtualized Oracle Communications Policy Management Offers Advanced Policy and Charging Capabilities to Communications Service Providers Large and Small

Press Release

Carrier-grade reliability and sophisticated policy and charging rules function now available with lower infrastructure investment and smaller deployment footprint

Redwood Shores, Calif.—Oct 6, 2015

Small, midsize, and large communications service providers (CSPs) are looking for ways to better personalize and monetize the services they offer. But sophisticated policy management capabilities have historically required large investments in hardware and were comparatively bulky—until now. To help address this issue, Oracle Communications now offers the ability to deploy Oracle Communications Policy Management within a single pair of active/standby commercial off-the-shelf (COTS) servers, which consume less than 4 inches in a rack. Based on Oracle Communications virtualization technology, the product offers CSPs the same proven carrier-grade functionality, flexibility, and reliability from Oracle in a smaller server footprint, making it more cost-effective and scalable whether a CSP has 500 subscribers or more than 500 million.

CSPs’ subscribers continue to increase both their data consumption and demand for a more personalized and controllable communications experience. As a result, network policy use cases are more complex and granular than ever, and new service providers—both new entrants and smaller, traditional CSPs—are taking advantage of the demand by introducing new offers. This dynamic has caused the need for robust policy management functionality that is also scalable—a need that is addressed by Oracle Communications Policy Management.

The Oracle product now enables CSPs, both large and small, to deploy a fully featured policy and charging rules function on a single physical pair of active/standby servers. This model offers CSPs additional flexibility in deploying a sophisticated policy management system, and makes the Oracle Communications proven policy management technology available more widely across the communications industry to:
  • Smaller CSPs and enterprise service providers with limited capital budgets
  • Policy management deployments with limited physical space
  • CSPs looking to reduce the footprint and cost of lab systems
“A more diverse set of companies—including both traditional and nontraditional CSPs, from cable operators to enterprise content and service providers—are launching digital communications offerings,” said Ron Westfall, research director, Service Enablement Ecosystem, Current Analysis. “This reality means that scalable, elastic policy and charging capable of handling complex and fluid situations is essential for driving innovation in the industry. Virtualization is one of the key ways to increase and intelligently manage the availability of such functionalities.”

“Oracle Communications has long offered proven policy and charging capabilities to the largest CSPs around the world, putting them in control of how they generate revenue and create an optimal customer experience,” said Doug Suriano, senior vice president and general manager, Oracle Communications. “Now, we have combined this experience with our expertise in virtualization to offer these same sophisticated capabilities to CSPs of all sizes and with varying policy management needs.”

Oracle Communications will be at LTE Asia 2015, October 5 through 7, in Suntec, Singapore. Join Oracle on October 7, 10:20 – 10:40, at “Implications of NFV in Transforming Your Business,” and hear more about virtualization from Boudewijn Pesch, group vice president, Asia Pacific, Japan, Middle East and Africa, Oracle Communications.
·         To learn more about policy and charging, please connect on Twitter @OracleComms and at facebook.com/oraclecommunications, or visit oracle.com/communications.

Oracle Hot Topics: Instance Crash Or ORA-04030 Errors When Pagefile Is Full

Knowledge Articles

Knowledge Article
Product Area
Last Updated
Oracle Database - Enterprise Edition
Mon, 5 Oct 2015 05:07 GMT-06:00


"This message contains information according to the preferences you set in My Oracle Support. To modify your settings or to turn off this automated message, login to My Oracle Support (http://support.oracle.com) and click on 'More' -> 'Settings' -> 'Hot Topics E-mail'" My Oracle Support

viernes, 2 de octubre de 2015

Webinar Ventajas de Oracle 12c In Memory Database






AROUG realizó el primer seminario virtual gratuito sobre una de las tecnologías más innovadoras de su base de datos Oracle 12c.
Utilizar la opción de Oracle Database in-memory puede solucionar múltiples problemas, pero antes es importante entender qué es, cómo funciona, cómo se compra?
AROUG presentó su primer seminario virtual sobre la opción In-Memory de la base de datos 12c con una demostración en vivo de algunas de sus virtudes.

Lisandro Fernigrini, Master Software Architect de Neoris, presentó sobre la opción In-Memory de la base de datos 12c con una demostración en vivo de algunas de sus virtudes.
Descargá la presentación y mirá la grabación acá
Facebook
Facebook
Twitter
Twitter
Website
Website
Email
Email

jueves, 1 de octubre de 2015

FBI: National Cyber Security Awareness Month

National Cyber Security Awareness Month
Securing Cyberspace is a Shared Responsibility
10/01/15
October is National Cyber Security Awareness Month, administered by the Department of Homeland Security. This is the perfect time of year for individuals, businesses, and other organizations to reflect on the universe of cyber threats and to do their part to protect their networks, their devices, and their data from those threats.
Consider this:
  •  
    Recent Cyber Successes
    In May 2015, the owner and operator of the original Silk Road website—an online black market designed to enable its users to buy and sell illegal drugs and other unlawful goods and services anonymously—was sentenced to life in prison. The Silk Road site had previously been taken down by law enforcement in November 2013. In November 2014, the owner and operator of a resurrected Silk Road—Silk Road 2.0—was arrested and charged, and law enforcement took down that site as well, along with dozens of other so-called “dark market” websites. The investigation involved the cooperative efforts of the FBI and numerous local, state, federal, and international partners.
    In April 2015, a multi-national law enforcement effort was responsible for taking down a cyber criminal forum that served as a one-stop, high-volume shopping venue for some of the world’s most prolific cyber criminals. Darkode was an underground password-protected meeting place for those interested in buying, selling, and trading malware, botnets, stolen personally identifiable information, credit card information, hacked server credentials, and other pieces of data and software. The FBI was able to infiltrate the forum at the highest levels and collect evidence and intelligence on Darkode members. During the takedown, charges, arrests, and searches involved 70 members and associates around the world.
    In April 2015, a coordinated international law enforcement and private sector cyber effort resulted in the takedown of a botnet known as Beebone—a “downloader” that allowed other forms of malware to be installed on victims’ computers without their knowledge or consent. The secondary infections installed by Beebone included software that steals banking logins and passwords as well as fraudulent anti-virus software and ransomware.
     
    Within the past year, personally identifiable information has been stolen in a number of significant cyber data breaches, impacting industries like health care, government, finance, corporate, and retail.
  • The use of malware by online criminals continues unabated, and of the available intrusion devices, the “bot” is particularly pervasive, allowing attackers to take control remotely of compromised computers. Once in place, these “botnets” can be used in distributed denial-of-service attacks, proxy and spam services, additional malware distribution, and other organized criminal activity.
  • Cyber criminals perpetrate a wide variety of crimes online, including theft of intellectual property, Internet fraud, identity fraud, and any number of financial fraud schemes.
  • Sexual predators use the Internet and social media to target the youngest and most vulnerable victims.
  • And many criminals use the so-called “dark web” or “dark market” websites that offer a range of illegal goods and services for sale on a network designed to conceal the true IP addresses of the computers on it.
The FBI—working in conjunction with its many partners at the local, state, federal, and international levels, as well as with industry—takes its own role in cyber security very seriously. That role involves operational efforts—including investigating and disrupting cyber-related national security threats and cyber crimes and collecting, analyzing, and disseminating cyber threat intelligence. It also involves outreach efforts to industry.
Here are just a few examples of how we’re doing all of that:
  • The FBI-led National Cyber Joint Investigative Task Force serves as the national focal point for coordinating cyber threat investigations. The work of the NCJITF includes a national public/private initiative to mitigate the use of botnets and malware by criminals, which has emerged as a global cyber security threat.
  • Cyber task forces in all 56 field offices coordinate domestic cyber threat investigations in local communities through information sharing, incident response, and joint enforcement and intelligence actions.
  • InfraGardan information-sharing and analysis effort with private sector partners who own, operate, and hold key positions within some 85 percent of the nation’s critical infrastructure—equips its members to identify and mitigate vulnerabilities, develop incident response plans, and enact security best practices.
  • The Internet Crime Complaint Center (IC3) accepts online submissions for Internet-related crime complaints, often involving fraudulent claims to consumers. These complaints can not only lead to culprits getting caught, but also help identify regional, national, or international trends to educate the public about constantly evolving cyber threats and scams.
  • The FBI’s Safe Online Surfing website, an online program that promotes cyber citizenship by educating young students in the essentials of online security in an effort to help protect them from child predators, cyber bullies, malware, a multitude of schemes, and other dangers on the Internet.
The Bureau will continue to work jointly with our national security and law enforcement partners to address threats to the nation’s cyber security from nation-states, terrorist organizations, transnational criminal enterprises, and child predators. But government can’t do it alone—assistance and vigilance from the public is vital.
Stay tuned to this website during the month of October—we’ll be providing you with tips that will help keep your families and your businesses safe from cyber criminals.

Oracle Database 12c Standard Edition 2 últimas noticias: Cambios de métricas y ciclo de vida


La controversia continúa alrededor del tema de la liberación de la nueva versión de base de datos Oracle Standard Edition 2, a partir del release 12.1.0.2.

Y no es para menos, el día de hoy vía cuenta de twitter, Victor López, Oracle Direct Database en la filial de Oracle Centroamerica, ha publicado a través de su perfil en Linkedin un FAQ muy conciso, sobre los alcances a nivel de licenciamiento y migración de las versiones Standard Edition One y Standard Edition anteriores.


No solo lo que están por leer a continuación es controversial, sino también algunos cambios que se han hecho el ciclo de vida del producto. Inicialmente se había definido, que la fecha de expiración de soporte premier de Oracle Database 12.1 sería Julio del 2018, sin embargo, la misma ha sido modificada. Las ediciones SE y SEO cambian su fecha al mes de Agosto del 2016, mientras que E.E. se mantiene.

Esto nos pone a correr aún más, ya que los cambios en las métricas a nivel físico, se complica un proceso de migración en SE a SE2 a partir de hardware utilizado actualmente por una gran cantidad de empresas. Muchos clientes tienen RAC en Standard Edition, con HW Blade de 2 sockets físicos por unidad. Actualmente es difícil encontrar servidores de un sólo socket. Si tienes 2 blades con 2 sockets físicos actualmente en SE, no los podrás utilizar en SE2 cuando hagas la migración, ya que la métrica a cambiado a 2 sockets físicos. Otro cambio importante, es que 12c SE2 es Single Tenant ( una sólo instancia de base de datos hospedada por cada contenedor de base de datos ), sin embargo, yo puedo tener varios contenedores de base de datos CDB's por servidor, siempre y cuando no exceda los 16 hilos por métrica por servidor, ya que según las notas de Oracle, es una limitación no sólo de licenciamiento, sino técnica.

La buena noticia, es que puedo tomar ventaja de la tecnología que me brinda el contenedor, para soportar clonar una base de datos de un CDB a otro CDB en un mismo server, sin necesidad de duplicar el área de almacenamiento inicialmente.

Aquí les dejo la nota de nuestro amigo Victor López.

¿Qué implicaciones tiene este anuncio?

La base de datos Oracle SE2 está disponible a partir de la versión 12c, puntualmente con 12.1.0.2.
  • El precio de lista de la licencia de SE2 es US$17.500 por procesador y US$350 por usuario nombrado (NUP)
  • El número mínimo de usuarios nombrados a licenciar para Oracle Standard Edition 2 es 10 NUPs por cada servidor donde se instale la base de datos.
  • SE2 incluye la funcionalidad de RAC (Real Application Clusters), limitada a dos servidores (nodos), y la capacidad máxima de cada servidor debe ser de un (1) procesador.
  • Las condiciones de uso de SE2 son:
­   Puede instalarse en servidores de máximo (2) procesadores SIN RAC.
­   Cuando se usa RAC, SE2 sólo puede licenciarse en dos servidores de un (1) procesador.


PREGUNTAS FRECUENTES

Pregunta: ¿Qué pasa con las versiones SE y SE1?

Respuesta: Van a permanecer en la lista de precios hasta el 1 de Diciembre de 2015.

Pregunta: Mi cliente aún no puede usar la versión 12c porque sus aplicaciones no están certificadas. Si SE2 sólo se soporta sobre 12c, ¿qué puedo hacer?

Respuesta: Los clientes que adquieran licenciamiento SE2 pueden implementar versiones anteriores (SE o SE1), sin embargo aplican las condiciones de licenciamiento para SE2 mencionadas anteriormente.

Pregunta: ¿Mi cliente puede migrar sus licencias SE hacia SE2?

Respuesta: Si. La migración es 1:1 por procesador o NUP, sin cargos adicionales de licenciamiento o soporte, y el cliente debe cumplir las condiciones de SE2 mencionadas anteriormente

Pregunta: ¿Mi cliente puede migrar sus licencias SE1 hacia SE2?

Respuesta: Si. La migración es 1:1 por procesador o NUP, con un cargo adicional de 20% en la tarifa de soporte, y el cliente debe cumplir las limitaciones de SE2 mencionadas anteriormente

Pregunta: Mi cliente tiene un servidor con 4 sockets donde actualmente tiene instalada y licenciada la base de datos Oracle Standard Edition ¿Puede instalar SE2?

Respuesta: No. El servidor excede la capacidad máxima de 2 sockets. Ni siquiera usando un método de particionamiento válido o hard partitioning (Oracle VM, por ejemplo) por la cantidad de sockets del servidor.

Pregunta: Si mi cliente tiene un servidor con 2 procesadores ¿Puede licenciar la base de datos SE2 para sólo uno de ellos?

Respuesta: Si, siempre y cuando utilice un método de particionamiento válido como Oracle VM y la capacidad máxima del servidor sea 2 procesadores
Victor Lopez Solano | Oracle Direct Database|
Phone: +506 22055623| Mobile: +506 70708741 |
Victor.M.Lopez@Oracle.com
Skype: Vlopez-cr

Todos los Sábados a las 8:00PM